New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Metadata: Upgrade Exiftool to fix security issue #1302
Comments
Already working on it: https://ubuntu.com/security/CVE-2021-22204 |
You can help by telling the Ubuntu team how important that is to you. |
In the meantime, you may disable Exiftool in the Advanced Settings and restart PhotoPrism: |
Our latest Docker image comes with the (hopefully) fixed version while everyone's waiting for an official update via apt:
Give us a few minutes to build a new release and upload the images. |
Note that allowing public uploads (like we do on our demo) is a generally bad idea in terms of security as we have a very long list of supported formats. Safe to assume some libs needed to read those contain currently unknown security issues. Besides exploits, uploads may also contain copyrighted material or pornography. For the same reason, you shouldn't open email attachments from strangers and don't use a virus-scanner that does so automatically: Exploiting its parsers is a common attack vector. In a later release, we may try to wrap external tools for added security (help welcome). |
Released: https://github.com/photoprism/photoprism/releases/tag/210519-24b5c7e6 @testanull Can you test again, please? Our demo is already updated. Happens automatically. |
I'm having trouble while trying to docker-compose up |
That loos like our development image? |
Added a security policy to our Developer Guide: https://docs.photoprism.org/developer-guide/security/policy/ |
@testanull We just switched from our manual fix to the official fix from ubuntu. Could you test it again? |
Sorry, I've already removed the PoC and the lab |
Maybe someone else can test it for us? Would be super helpful. |
CVE-2021-22204 is a critical RCE in ExifTool (ref: https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html), It can be easily triggered just by parsing an image (ex: exftool foo.jpg)
I found Photoprism is using ExifTool while importing image after uploading, and also succeeded in confirm the vulnerability in Photoprism demo page
Please do something to fix this vuln,
The text was updated successfully, but these errors were encountered: